Sciweavers

1034 search results - page 149 / 207
» A UNITY-Based Framework Towards Component Based Systems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
IFIP
2004
Springer
15 years 3 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
TSP
2011
152views more  TSP 2011»
14 years 4 months ago
Blind Adaptive Constrained Constant-Modulus Reduced-Rank Interference Suppression Algorithms Based on Interpolation and Switched
—This work proposes a blind adaptive reduced-rank scheme and constrained constant-modulus (CCM) adaptive algorithms for interference suppression in wireless communications system...
Rodrigo C. de Lamare, Raimundo Sampaio Neto, Marti...
TMI
2011
127views more  TMI 2011»
14 years 4 months ago
Reconstruction of Large, Irregularly Sampled Multidimensional Images. A Tensor-Based Approach
Abstract—Many practical applications require the reconstruction of images from irregularly sampled data. The spline formalism offers an attractive framework for solving this prob...
Oleksii Vyacheslav Morozov, Michael Unser, Patrick...
CHI
2009
ACM
15 years 1 months ago
Hyperlinking reality via camera phones
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
Dusan Omercevic, Ales Leonardis